WO2020034102A1 - Procédé d'accès sans licence basé sur des groupes, appareil, et système - Google Patents

Procédé d'accès sans licence basé sur des groupes, appareil, et système Download PDF

Info

Publication number
WO2020034102A1
WO2020034102A1 PCT/CN2018/100513 CN2018100513W WO2020034102A1 WO 2020034102 A1 WO2020034102 A1 WO 2020034102A1 CN 2018100513 W CN2018100513 W CN 2018100513W WO 2020034102 A1 WO2020034102 A1 WO 2020034102A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource set
rate
total
rate interval
accessed
Prior art date
Application number
PCT/CN2018/100513
Other languages
English (en)
Chinese (zh)
Inventor
成后发
Original Assignee
华为技术有限公司
中国科学技术大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司, 中国科学技术大学 filed Critical 华为技术有限公司
Priority to CN201880096487.4A priority Critical patent/CN112567856B/zh
Priority to PCT/CN2018/100513 priority patent/WO2020034102A1/fr
Publication of WO2020034102A1 publication Critical patent/WO2020034102A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling

Definitions

  • the present application relates to the field of communications technologies, and in particular, to an access method, device, and system for unauthorized packets.
  • mMTC massive Machine Type Communication
  • NOMA non-orthogonal multiple address
  • the NOMA technology allocates a resource to multiple terminals, that is, multiple terminals perform power reuse on the same resource, thereby improving resource utilization.
  • multiple terminals perform power multiplexing on the same resource, and resource collision occurs during random access, causing network congestion.
  • access classification restrictions (ACB) or polling technologies are usually used for access.
  • APB access classification restrictions
  • polling technologies are usually used for access.
  • the use of access classification technologies or polling technologies will result in large access delays and make terminal services The perception is not good and the access efficiency is not high.
  • This application provides an access method, device, and system for unauthorized packets, so as to improve the access efficiency of the terminal on the basis of ensuring terminal service awareness.
  • an embodiment of the present application provides a method for accessing an unauthorized packet.
  • the method for accessing an unauthorized packet may include:
  • a rate interval and a resource set corresponding to each of the L groups are determined; where L is an integer greater than or equal to 1 and less than or equal to M;
  • the access information is used to indicate the rate interval and resource set corresponding to each packet, so that the M to-be-connected devices perform connection according to their respective to-be-used rate information and access information.
  • determining a rate interval and a resource set corresponding to each of the L packets according to the to-be-used rate information of each device to be accessed may include:
  • the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-be-accessed devices are determined; where the total-rate interval is the corresponding one for each packet Union of rate intervals, the total resource set is the complete set of resource sets corresponding to each group;
  • a rate interval and a resource set corresponding to each of the L packets are determined.
  • determining the rate interval and resource set corresponding to each of the L packets according to the total rate interval and the total resource set may include:
  • the resource set corresponding to each packet is determined according to the sum of the rates of the rate intervals corresponding to each packet and the total resource set.
  • the access information includes a total rate interval, a number of packets L, and a resource set corresponding to each packet.
  • determining the rate interval and resource set corresponding to each of the L packets according to the total rate interval and the total resource set may include:
  • the total resource set is divided into equal resources to obtain the resource set corresponding to each group;
  • the access information includes L + 1 boundary values dividing a total rate interval, and a resource set corresponding to each packet.
  • determining the total resource set required by the M to-be-accessed devices according to the to-be-used rate information of each to-be-accessed device may include:
  • K represents the first constant
  • ⁇ L represents the minimum boundary value of the total rate interval
  • ⁇ M represents the maximum boundary value of the total rate interval
  • represents the rate to be used
  • f ( ⁇ ) represents the probability distribution function corresponding to the rate to be used.
  • an embodiment of the present application further provides a method for accessing an unauthorized group.
  • the method for accessing an unauthorized group may include:
  • the to-be-used rate information of the device determines the total rate interval corresponding to the device to be accessed and the required total resource set, and is determined according to the total rate interval and the total resource set;
  • Access is performed according to its to-be-used rate information and access information.
  • accessing according to the rate information to be used and the access information includes:
  • the target group is selected according to its to-be-used rate information, the rate interval corresponding to each group, and the resource set, and is accessed.
  • access information includes L + 1 boundary values dividing the total rate interval and the resource set corresponding to each packet
  • access is performed according to the rate information and access information to be used, include:
  • the target group is selected according to its to-be-used rate information, the rate interval corresponding to each group, and the resource set, and is accessed.
  • an embodiment of the present application further provides a network device, and the network device may include:
  • An obtaining unit configured to obtain information on a rate to be used of each of the M devices to be accessed; wherein M is an integer greater than or equal to 2;
  • a determining unit configured to determine a rate interval and a resource set corresponding to each of the L packets according to the to-be-used rate information of each device to be accessed; wherein L is an integer greater than or equal to 1 and less than or equal to M ;
  • a sending unit configured to send access information to the M to-be-accessed devices; the access information is used to indicate a rate interval and a resource set corresponding to each packet, so that the M to-be-accessed devices may Access information for access.
  • the determining unit is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, the total rate interval corresponding to the M to-be-accessed devices and the required The total resource set; where the total rate interval is the union of the rate intervals corresponding to each group, and the total resource set is the complete set of the resource sets corresponding to each group; and the L groups are determined according to the total rate interval and the total resource set. Rate interval and resource set corresponding to each packet.
  • the determining unit is specifically configured to divide the total rate interval in equal steps according to the number of packets L to obtain a rate interval corresponding to each packet; and according to the rate of the rate interval corresponding to each packet And, and the total resource set, determine the resource set corresponding to each group.
  • the access information includes a total rate interval, a number of packets L, and a resource set corresponding to each packet.
  • the determining unit is specifically configured to divide the total resource set into equal resources according to the number of groups L to obtain the resource set corresponding to each group; and according to the resource amount of the resource set corresponding to each group, Divide the total rate interval with the to-be-used rate information of each device to be accessed to obtain the rate interval corresponding to each packet.
  • the access information includes L + 1 boundary values dividing a total rate interval, and a resource set corresponding to each packet.
  • the determining unit is specifically configured to Determine the total resource set required by the M devices to be accessed;
  • K represents the first constant
  • ⁇ L represents the minimum boundary value of the total rate interval
  • ⁇ M represents the maximum boundary value of the total rate interval
  • represents the rate to be used
  • f ( ⁇ ) represents the probability distribution function corresponding to the rate to be used.
  • an embodiment of the present application further provides a device to be accessed, which may include:
  • a receiving unit configured to receive access information sent by a network device; wherein the access information is used to indicate a rate interval and a resource set corresponding to each of the L packets; a corresponding rate interval and a resource interval of each packet are a network
  • the device determines the total rate interval and the required total resource set corresponding to the device to be accessed according to the to-be-used rate information of the device to be accessed, and determines according to the total rate interval and the total resource set;
  • the access unit is configured to perform access according to the rate information and access information to be used.
  • the access unit when the access information includes a total rate interval, the number of packets L, and a resource set corresponding to each packet, the access unit is specifically configured to determine each packet according to the total rate interval and the number of packets L The corresponding rate interval; and select a target group according to the rate information to be used, the rate interval corresponding to each packet, and the resource set, and perform access.
  • the access unit when the access information includes L + 1 boundary values dividing the total rate interval and a resource set corresponding to each packet, the access unit is specifically configured to be based on the L + 1 boundary values The rate interval corresponding to each of the L packets is determined; and the target packet is selected and accessed based on the rate information to be used, the rate interval corresponding to each packet, and the resource set.
  • an embodiment of the present application further provides a network device.
  • the network device may include:
  • a processor configured to obtain information on a rate to be used of each of the M devices to be accessed; where M is an integer greater than or equal to 2;
  • the processor is further configured to determine a rate interval and a resource set corresponding to each of the L packets according to the to-be-used rate information of each device to be accessed; where L is greater than or equal to 1 and less than or equal to M Integer
  • the transmitter is configured to send access information to the M to-be-accessed devices; the access information is used to indicate a rate interval and a resource set corresponding to each packet, so that the M to-be-accessed devices may Access information for access.
  • the processor is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, the total rate interval corresponding to the M to-be-accessed devices and the required The total resource set; where the total rate interval is the union of the rate intervals corresponding to each group, and the total resource set is the complete set of the resource sets corresponding to each group; and the L groups are determined according to the total rate interval and the total resource set. Rate interval and resource set corresponding to each packet.
  • the processor is specifically configured to divide the total rate interval in equal steps according to the number of packets L to obtain the rate interval corresponding to each packet; and according to the rate of the rate interval corresponding to each packet And, and the total resource set, determine the resource set corresponding to each group.
  • the access information includes a total rate interval, a number of packets L, and a resource set corresponding to each packet.
  • the processor is specifically configured to divide the total resource set into equal resources according to the number of packets L to obtain a resource set corresponding to each group; and according to the resource amount of the resource set corresponding to each group, Divide the total rate interval with the to-be-used rate information of each device to be accessed to obtain the rate interval corresponding to each packet.
  • the access information includes L + 1 boundary values dividing a total rate interval, and a resource set corresponding to each packet.
  • the processor is specifically configured according to Determine the total resource set required by the M devices to be accessed;
  • K represents the first constant
  • ⁇ L represents the minimum boundary value of the total rate interval
  • ⁇ M represents the maximum boundary value of the total rate interval
  • represents the rate to be used
  • f ( ⁇ ) represents the probability distribution function corresponding to the rate to be used.
  • an embodiment of the present application further provides a device to be accessed, which may include:
  • a receiver configured to receive access information sent by a network device; wherein the access information is used to indicate a rate interval and a resource set corresponding to each of the L packets; a corresponding rate interval and a resource interval of each packet are a network
  • the device determines the total rate interval and the required total resource set corresponding to the device to be accessed according to the to-be-used rate information of the device to be accessed, and determines according to the total rate interval and the total resource set;
  • a processor configured to perform access according to its to-be-used rate information and access information.
  • the processor when the access information includes the total rate interval, the number of packets L, and the resource set corresponding to each packet, the processor is specifically configured to determine the correspondence of each packet according to the total rate interval and the number of packets L And select a target packet according to its rate information to be used, the rate interval corresponding to each packet, and the resource set, and access it.
  • the processor when the access information includes L + 1 boundary values that divide the total rate interval, and a resource set corresponding to each packet, the processor is specifically configured to determine according to the L + 1 boundary values A rate interval corresponding to each of the L packets; and a target packet is selected and accessed based on the rate information to be used, the rate interval corresponding to each packet, and the resource set.
  • an embodiment of the present application further provides an access system for an unauthorized packet.
  • the access system for the unauthorized packet may include:
  • an embodiment of the present application further provides a computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the non- The method for accessing an authorized packet, or when the computer program is executed by a processor, executes the method for accessing an unauthorized packet as described in any one of the second aspects.
  • an embodiment of the present application further provides a chip.
  • a computer program is stored on the chip, and a computer program is stored on a computer-readable storage medium.
  • any one of the foregoing first aspect is executed.
  • the method, device, and system for accessing unauthorized packets obtain information about the to-be-used rate of each of the M to-be-accessed devices; and according to the to-be-used of each to-be-accessed device Rate information, determining the rate interval and resource set corresponding to each of the L packets; after determining the rate interval and resource set corresponding to each packet, sending access information to the M devices to be accessed; the access information is used To indicate the rate interval and resource set corresponding to each packet, so that each of the M to-be-accessed devices receives the access device information, and selects a target group according to the respective to-be-used rate information and access information. Make access.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a method for accessing an unauthorized packet according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of another method for accessing an unauthorized packet according to an embodiment of the present application
  • FIG. 4 is a schematic diagram of a rate probability distribution according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another unauthorized packet access method according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a network device according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a device to be accessed according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of another network device according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of another device to be accessed according to an embodiment of the present application.
  • the embodiments of the present application are applied to a 5G communication system or other systems that may appear in the future. Some terms in the present application are explained below to facilitate understanding by those skilled in the art. It should be noted that when the solution of the embodiment of the present application is applied to a 5G system or other systems that may appear in the future, the names of network equipment and terminals may change, but this does not affect the implementation of the solution of the embodiment of the present application.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • the communication system may be a non-orthogonal multiple address (NOMA) system.
  • NOMA non-orthogonal multiple address
  • the NOMA system may include a network device 101 and multiple standby devices.
  • the network device 101 such as an MTD or a base station
  • the network device 101 can control each of the devices 102 (such as terminals) to be accessed to access the network.
  • the network device 101 such as an MTD or a base station
  • the devices 102 such as terminals
  • FIG. 1 Taking the NOMA system including a network device 101 and four devices to be accessed 102 as an example, resources will occur when the four devices to be accessed 102 perform power multiplexing on the same resource. Collision causes network congestion.
  • Terminal also known as terminal equipment and user equipment
  • Terminal equipment is a device that provides users with voice and / or data connectivity, and may also be some kind of smart device with networking capabilities, such as those with wireless connectivity Hand-held devices, vehicle-mounted devices, smart air conditioners, smart cars, etc.
  • Common terminal devices include: mobile phones, tablets, laptops, PDAs, mobile Internet devices (MID), and wearable devices.
  • wearable devices include: smart watches, smart bracelets, step counting ⁇ ⁇ And other.
  • Network equipment also known as Radio Access Network (RAN) equipment is a device that connects terminal equipment to a wireless network, and includes network equipment in various communication standards, such as including but not limited to : Base station, evolved Node B (eNB), radio network controller (RNC), node B (NB), network equipment controller (Base Station Controller, BSC), network equipment Transceiver Station (Base Transceiver Station, BTS), home network equipment (for example, Home NodeB, or Home NodeB, HNB), Baseband Unit (BBU), and so on.
  • RAN Radio Access Network
  • the network equipment includes network equipment of various frequency systems, such as, but not limited to, low-frequency network equipment and high-frequency network equipment.
  • an embodiment of the present application provides an access method for unauthorized packets.
  • This method obtains each of the M to-be-accessed devices to be accessed.
  • a network device is used as an example of the base station.
  • the base station determines the rate interval and resource set corresponding to each of the L packets according to the rate information of each device to be accessed. Can be implemented in at least two possible ways. In one possible implementation, the base station may first determine the rate interval corresponding to each of the L packets, and then according to the rate interval corresponding to the rate interval of each packet.
  • the base station may first determine the resource set corresponding to each of the L packets, and then according to the resource amount of the resource set corresponding to each packet, and each The to-be-used rate information of a device to be accessed determines a rate interval corresponding to each packet.
  • FIG. 2 is a schematic flowchart of an access method of an unauthorized packet provided by an embodiment of the present application
  • FIG. 3 is another embodiment of the present application.
  • a schematic flowchart of an access method for unauthorized packets In the following, the access methods of these two different unauthorized packets will be described in detail.
  • the method for accessing the unauthorized packet may include:
  • the base station obtains information on a rate to be used of each of the M devices to be accessed.
  • M is an integer greater than or equal to 2, and it can be specifically set according to actual needs.
  • the specific number of M is not specifically limited in the embodiment of the present application.
  • each device to be accessed can correspond to at least one service, and each service has its own rate requirement.
  • the The to-be-used rate information can be understood as the sum of the rate requirements of all the services corresponding thereto.
  • each device to be accessed only corresponds to a single rate requirement, that is, its multiple services are almost the same rate requirement services.
  • the base station Before the base station obtains the to-be-used rate information of each of the M to-be-accessed devices, it establishes a connection relationship between it and each to-be-accessed device in advance.
  • the connection relationship may be a communication connection between an existing device to be accessed and a base station.
  • the communication connection may be a communication unauthorized access connection. After an unauthorized access connection is established between one to-be-accessed device, the to-be-used rate information of each of the M to-be-accessed devices can be obtained.
  • the base station when it obtains the to-be-used rate information of each of the M to-be-accessed devices, it can receive each of the to-be-accessed devices by receiving the respective to-be-used rate information reported by each to-be-accessed device.
  • Rate information of the access devices to be used may also be established based on historical statistical data of each device to be accessed and the service model involved, and to determine the rate of each device to be accessed according to the established rate distribution model.
  • Rate information to be used For example, please refer to FIG. 4, which is a schematic diagram of a rate probability distribution provided by an embodiment of the present application. The horizontal axis in FIG. 4 represents the rate of the device to be accessed, and the vertical axis represents the probability density. It can be seen that, after the rate distribution model is established according to the historical statistical data of the device to be accessed and the service model involved, the to-be-used rate information of the device to be accessed can be obtained according to the established rate distribution model.
  • the base station determines the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-be-accessed devices according to the to-be-used rate information of each to-be-accessed device.
  • the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a complete set of the resource sets corresponding to each group.
  • the resources of the device to be accessed may include frequency, time, and code, and may be expressed as (f, t, c); of course, it may include only one or any two of frequency, time, and code. It is set according to actual needs.
  • the embodiment of the present invention is only described by using the resource of the device to be accessed as including frequency, time, and code as an example, but it does not mean that the embodiment of the present application is limited to this.
  • the minimum rate of services performed by each of the devices to be accessed may be determined first, and the required services of all the services to be performed by all the devices to be accessed are required.
  • the minimum rate is determined as the minimum boundary value of the total rate interval, and the minimum boundary value can be recorded as ⁇ L to obtain the minimum boundary value of the total rate interval.
  • the maximum boundary value can be recorded as ⁇ M , where P U represents the maximum transmit power of the device to be accessed, that is, the maximum rate requirement of the device to be accessed cannot exceed the device's own Maximum power limit, N 0 represents the system bandwidth, and W represents the system bandwidth, so as to obtain the maximum boundary value of the total rate interval, and then determine the total rate interval corresponding to the M devices to be accessed according to the minimum boundary value and the maximum boundary value as [ ⁇ L , ⁇ M ].
  • determining the total resource set required by the M to-be-accessed devices according to the to-be-used rate information of each to-be-accessed device it may be based on Determine the total resource set required by the M devices to be accessed.
  • K represents the first constant
  • ⁇ L represents the minimum boundary value of the total rate interval
  • ⁇ M represents the maximum boundary value of the total rate interval
  • represents the rate to be used
  • f ( ⁇ ) represents the probability distribution function corresponding to the rate to be used.
  • C represents the second constant.
  • the base station divides the total rate interval into equal steps according to the number of packets L to obtain a rate interval corresponding to each packet.
  • the number of packets L may be equal to 3 or 5, which may be specifically set according to actual needs.
  • the specific number of L is not further limited in the embodiment of the present application.
  • the total rate interval corresponding to the M to-be-accessed devices can be divided into equal steps according to the number of packets L to obtain the rate interval corresponding to each packet.
  • the rate interval corresponding to the first packet can be labeled as [ ⁇ 0 , ⁇ 1 ]
  • the rate interval corresponding to the second packet can be labeled as [ ⁇ 1 , ⁇ 2 ], ... the rate corresponding to the L-1th packet.
  • the interval can be labeled as [ ⁇ L-2 , ⁇ L-1 ], and the rate interval corresponding to the Lth packet can be labeled as [ ⁇ L-1 , ⁇ L ], that is, the rate interval corresponding to the i-th packet can be labeled as [ ⁇ i-1 , ⁇ i ], where i ⁇ [1, L], after marking the L packets, the rate interval corresponding to each of the L packets can be calculated specifically. For example, you can Divide the total rate interval, where s represents the step size for dividing the total rate interval.
  • the rate interval corresponding to each of the L groups can be further determined, and the rate interval corresponding to the first group Is [ ⁇ L , ⁇ L + s], the rate interval corresponding to the second group is [ ⁇ L + s, ⁇ L + 2s], and the rate interval corresponding to the third group is [ ⁇ L + 2s, ⁇ L + 3s], ...
  • the rate interval corresponding to the L-1th packet is [ ⁇ L + (L-2) s, ⁇ L + (L-1) s], and the rate interval corresponding to the Lth packet is [ ⁇ L + (L-1) s, ⁇ M ] to obtain the rate interval corresponding to each packet.
  • the groups when dividing the total rate interval according to the number of packets L, the groups may be grouped according to an equal step size, or of course, they may not be grouped according to an equal step size. Specifically, the total The rate interval is divided differently.
  • the embodiment of the present application is only described by taking the equal step size division of the total rate interval according to the number of packets L as an example, but it does not mean that the embodiment of the present application is limited to this.
  • the base station determines the resource set corresponding to each packet according to the sum of the rates of the rate intervals corresponding to each packet and the total resource set.
  • the sum of the rates of the rate intervals corresponding to each packet may be used to correspond to the The principle of matching resource sets is to divide the corresponding resource set for each group. For example, you can Divide the total resource set to obtain the resource set corresponding to each group.
  • i represents the i-th packet among the L packets, Represents the total rate information required by all the devices to be accessed in the total rate interval [ ⁇ i-1 , ⁇ i ], ⁇ i represents the resource amount of the resource set corresponding to the i-th packet, and the complete set of each ⁇ i constitutes the total Resource collection.
  • the base station sends access information to the M to-be-accessed devices.
  • the access information includes the total rate interval, the number of packets L, and the resource set corresponding to each packet.
  • each to-be-accessed device can know in advance that the total rate interval is divided into equal step sizes. Therefore, the base station only needs to set the total rate interval [ ⁇ L , ⁇ M ], The number of packets L and the resource set corresponding to each packet can be sent to each device to be accessed, so that the device to be accessed can obtain the correspondence of each packet according to the total rate interval [ ⁇ L , ⁇ M ].
  • the access information may also indicate that the rate division method is equal-step division.
  • the base station may send access information to M to-be-accessed devices in a broadcast manner, so that after each to-be-accessed device receives the access information sent by the base station, the following S206 is performed. :
  • the device to be accessed determines a rate interval corresponding to each packet according to the total rate interval and the number of packets L.
  • the total rate interval may be divided by equal steps according to the number of packets in the access message, so as to obtain the rate interval corresponding to each packet. It should be noted that the total rate interval is divided in equal steps according to the number of packets in the access message, and the specific method for obtaining the rate interval corresponding to each packet can refer to the related description in S203 above. Here, the implementation of this application Examples are not repeated here.
  • the device to be accessed selects a target group according to the rate information to be used, a rate interval corresponding to each group, and a resource set, and performs access.
  • the packet whose own to-be-used rate information is located is a target packet, and access is performed according to the rate interval and resource set corresponding to the target packet.
  • the base station may first obtain the to-be-used rate information of each of the M to-be-accessed devices, and according to each of the to-be-accessed devices, The information about the to-be-used rate of the access device determines the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-access devices; After the total resource set, the total rate interval can be divided by equal steps according to the number of packets L to obtain the rate interval corresponding to each packet, and determined according to the sum of the rates of the rate intervals corresponding to each packet and the total resource set.
  • the resource set corresponding to each packet after determining the rate interval and resource set corresponding to each packet in the L packets, the access information is sent to the M to-be-accessed devices, so that each to-be-accessed device receives the
  • the rate interval corresponding to each packet can be determined according to the total rate interval and the number of packets L included in the received information, and according to the rate to be used Information, rate interval and resource set corresponding to each group, select a target group, so that access is performed according to the rate interval and resource set corresponding to the target group.
  • rate interval corresponding to each packet is an example, please refer to FIG. 3.
  • the access method of the unauthorized packet may include:
  • the base station acquires the to-be-used rate information of each of the M to-be-accessed devices.
  • the base station determines the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-be-accessed devices according to the to-be-used rate information of each to-be-accessed device.
  • the manner in which the S301 base station obtains the to-be-used rate information of each of the M to-be-accessed devices, and the S302 base station according to the to-be-used rate of each to-be-accessed device Information to determine the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-be-accessed devices is similar to the methods in S201 and S202 in the embodiment shown in FIG. 2 described above, see the above. Relevant descriptions in S201 and S202 in the embodiment shown in FIG. 2 are not described in the embodiment of the present application.
  • the base station divides the total resource set into equal resources according to the number of packets L to obtain a resource set corresponding to each packet.
  • the resource amount of the resource set corresponding to each group is It is only necessary to determine the corresponding resource set according to the resource amount of the resource set corresponding to each group, so as to ensure that the resource amount corresponding to the resource set in each group is equal or approximately equal.
  • the base station divides the total rate interval according to the resource amount of the resource set corresponding to each packet and the to-be-used rate information of each device to be accessed to obtain the rate interval corresponding to each packet.
  • the resource amount of the resource set corresponding to each group may be compared with The principle of matching the corresponding rate interval is to divide the corresponding rate interval for each packet. For example, you can The total rate interval is divided, so that each packet is divided into its corresponding rate interval.
  • i represents the i-th packet among the L packets, Represents the total rate information required by all the devices to be accessed in the total rate interval [ ⁇ i-1 , ⁇ i ], ⁇ i represents the resource amount of the resource set corresponding to the i-th packet, and is equal to or approximately equal amount of resources, and each corpus ⁇ i constituting the total set of resources.
  • the base station sends access information to the M devices to be accessed.
  • the access information includes L + 1 boundary values dividing the total rate interval, and a resource set corresponding to each packet.
  • the base station may send access information to M to-be-accessed devices in a broadcast manner, so that after each to-be-accessed device receives the access information sent by the base station, the following S306 is performed. :
  • the to-be-accessed device determines a rate interval corresponding to each of the L packets according to the L + 1 boundary values.
  • each device to be accessed after receiving the access message, it can first divide the total rate interval according to the L + 1 boundary values in the access message to obtain L rate intervals, and can determine Rate interval corresponding to each packet.
  • the rate interval corresponding to the first boundary value and the second boundary value is the rate interval corresponding to the first packet
  • the rate interval corresponding to the second boundary value and the third boundary value corresponds to the second packet.
  • the rate interval corresponding to the Lth boundary value and the L + 1th boundary value is the rate interval corresponding to the Lth packet, so as to obtain the rate interval corresponding to each of the L packets.
  • the device to be accessed selects a target packet according to the rate information to be used, a rate interval corresponding to each packet, and a resource set, and performs access.
  • the packet whose own to-be-used rate information is located is a target packet, and access is performed according to the rate interval and resource set corresponding to the target packet.
  • the base station may first obtain the to-be-used rate information of each of the M to-be-accessed devices, and according to each to-be-connected device, The information about the to-be-used rate of the incoming devices, to determine the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-access devices; After the resource set, the total resource set can be divided into equal resources according to the number of packets L to obtain the resource set corresponding to each group, and the resource amount of the resource set corresponding to each group, and the waiting time of each device to be accessed.
  • each device to be accessed determines that each of the L packets corresponds to each other according to the L + 1 boundary values included in the access information.
  • Rate interval select a target group according to its to-be-used rate information, the rate interval corresponding to each group, and the resource set, and access it, so as to access according to the rate interval and resource set corresponding to the target group, in accordance with the prior art
  • FIG. 5 is a schematic flowchart of still another method for accessing an unauthorized group according to an embodiment of the present application. Specifically, when implementing access to an unauthorized group, the solution shown in FIG. 2 and FIG. 3 is implemented.
  • the difference is that after determining the total rate interval corresponding to the M to-be-accessed devices and the total resource set required by the M to-be-accessed devices according to the to-be-used rate information of each to-be-accessed device, the L number is not directly calculated
  • the rate interval and resource set corresponding to each packet in the packet but first send a request message for the total resource set M to the base station, so that the base station allocates the required resources to the MTD device according to the request message, and sends it to the base station after receiving it.
  • the rate interval and resource set corresponding to each of the L packets are calculated.
  • the specific manner is similar to the manner in FIG. 2 or FIG. 3 described above. This embodiment will not repeat them.
  • FIG. 6 is a schematic structural diagram of a network device 60 according to an embodiment of the present application.
  • the network device 60 may include:
  • the obtaining unit 601 is configured to obtain information on a rate to be used of each of the M devices to be accessed; where M is an integer greater than or equal to 2.
  • a determining unit 602 configured to determine a rate interval and a resource set corresponding to each of the L packets according to the to-be-used rate information of each device to be accessed; where L is greater than or equal to 1 and less than or equal to M Integer.
  • a sending unit 603 is configured to send access information to the M to-be-accessed devices; the access information is used to indicate a rate interval and a resource set corresponding to each packet, so that the M to-be-accessed devices are based on their respective to-be-used rate information And access information for access.
  • the determining unit 602 is specifically configured to determine a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices according to the to-be-used rate information of each to-be-accessed device;
  • the total rate interval is the union of the rate intervals corresponding to each packet, and the total resource set is the complete set of resource sets corresponding to each packet; and according to the total rate interval and the total resource set, it is determined that each of the L groups corresponds to Rate range and resource collection.
  • the determining unit 602 is specifically configured to divide the total rate interval in equal steps according to the number of packets L to obtain the rate interval corresponding to each packet; and to calculate the sum of the rates of the rate intervals corresponding to each packet and the total Resource set, determine the resource set corresponding to each group.
  • the access information includes a total rate interval, a number of packets L, and a resource set corresponding to each packet.
  • the determining unit 602 is specifically configured to divide the total resource set into equal resources according to the number of packets L to obtain the resource set corresponding to each group; and according to the resource amount of the resource set corresponding to each group, and each The rate information to be used by the access device divides the total rate interval to obtain the rate interval corresponding to each packet.
  • the access information includes L + 1 boundary values dividing the total rate interval, and a resource set corresponding to each packet.
  • the determining unit 602 is specifically configured to Determine the total resource set required by the M devices to be accessed.
  • K represents the first constant
  • ⁇ L represents the minimum boundary value of the total rate interval
  • ⁇ M represents the maximum boundary value of the total rate interval
  • represents the rate to be used
  • f ( ⁇ ) represents the probability distribution function corresponding to the rate to be used.
  • the network device 60 shown in this embodiment of the present application can execute the technical solution of the method for accessing an unauthorized packet on the network device 60 side in any of the foregoing embodiments.
  • the implementation principle and beneficial effects of the method are similar to those of the method embodiments. I will not repeat them here.
  • FIG. 7 is a schematic structural diagram of a device to be accessed 70 according to an embodiment of the present application.
  • the device to be accessed 70 may include:
  • the receiving unit 701 is configured to receive access information sent by a network device.
  • the access information is used to indicate a rate interval and a resource set corresponding to each of the L packets.
  • the corresponding rate interval and resource interval of each packet are The network device determines the total rate interval corresponding to the to-be-accessed device 70 and the required total resource set according to the to-be-accessed device 70 information, and determines the total rate interval and the total resource set.
  • the access unit 702 is configured to perform access according to the rate information and access information to be used.
  • the access unit 702 is specifically configured to determine the rate interval corresponding to each packet according to the total rate interval and the number of packets L ; And select a target group according to the rate information to be used, the rate interval corresponding to each group, and the resource set, and perform access.
  • the access unit 702 is specifically configured to determine L packets according to the L + 1 boundary values The rate interval corresponding to each packet in the network; and select a target packet according to the rate information to be used, the rate interval corresponding to each packet, and the resource set, and access it.
  • the to-be-accessed device 70 shown in the embodiment of the present application may execute the technical solution of the method for accessing an unauthorized packet on the to-be-accessed device 70 side according to any one of the embodiments described above, and its implementation principles and beneficial effects and method implementation The examples are similar and will not be repeated here.
  • FIG. 8 is a schematic structural diagram of another network device 80 according to an embodiment of the present application.
  • the network device 80 may include:
  • the processor 801 is configured to obtain information on a rate to be used of each of the M devices to be accessed; where M is an integer greater than or equal to 2.
  • the processor 801 is further configured to determine a rate interval and a resource set corresponding to each of the L packets according to the to-be-used rate information of each device to be accessed; where L is greater than or equal to 1 and less than or equal to M Integer.
  • the transmitter 802 is configured to send access information to the M to-be-accessed devices; the access information is used to indicate a rate interval and a resource set corresponding to each packet, so that the M to-be-accessed devices are based on their respective to-be-used rate information. And access information for access.
  • the processor 801 is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices;
  • the total rate interval is the union of the rate intervals corresponding to each packet, and the total resource set is the complete set of resource sets corresponding to each packet; and according to the total rate interval and the total resource set, it is determined that each of the L groups corresponds to Rate range and resource collection.
  • the processor 801 is specifically configured to divide the total rate interval in equal steps according to the number of packets L to obtain the rate interval corresponding to each packet; and according to the sum of the rates of the rate intervals corresponding to each packet, and the total Resource set, determine the resource set corresponding to each group.
  • the access information includes a total rate interval, a number of packets L, and a resource set corresponding to each packet.
  • the processor 801 is specifically configured to divide the total resource set into equal resources according to the number of packets L to obtain a resource set corresponding to each group; and according to the resource amount of the resource set corresponding to each group, and each The rate information to be used by the access device divides the total rate interval to obtain the rate interval corresponding to each packet.
  • the access information includes L + 1 boundary values dividing the total rate interval, and a resource set corresponding to each packet.
  • the processor 801 is specifically used according to Determine the total resource set required by the M devices to be accessed.
  • K represents the first constant
  • ⁇ L represents the minimum boundary value of the total rate interval
  • ⁇ M represents the maximum boundary value of the total rate interval
  • represents the rate to be used
  • f ( ⁇ ) represents the probability distribution function corresponding to the rate to be used.
  • the network device 80 shown in this embodiment of the present application can execute the technical solution of the method for accessing unauthorized packets on the network device 80 side shown in any of the above embodiments.
  • the implementation principle and beneficial effects of the method are similar to those of the method embodiments. I will not repeat them here.
  • FIG. 9 is a schematic structural diagram of another device to be accessed 90 according to an embodiment of the present application.
  • the device to be accessed 90 may include:
  • the receiver 901 is configured to receive access information sent by a network device.
  • the access information is used to indicate a rate interval and a resource set corresponding to each of the L packets.
  • the corresponding rate interval and resource interval of each packet are The network device determines the total rate interval corresponding to the to-be-accessed device 90 and the required total resource set according to the to-be-accessed device 90 information, and determines the total rate interval and the total resource set.
  • the processor 902 is configured to perform access according to the rate information and access information to be used.
  • the processor 902 is specifically configured to determine the rate interval corresponding to each packet according to the total rate interval and the number of packets L; The target group is selected and accessed based on the rate information to be used, the rate interval corresponding to each group, and the resource set.
  • the processor 902 is specifically configured to determine the L packets according to the L + 1 boundary values.
  • the rate interval corresponding to each packet; and a target packet is selected and accessed according to the rate information to be used, the rate interval corresponding to each packet, and the resource set.
  • the to-be-accessed device 90 shown in the embodiment of the present application may execute the technical solution of the method for accessing an unauthorized packet on the to-be-accessed device 90 side according to any one of the foregoing embodiments, and its implementation principle, beneficial effects, and method implementation The examples are similar and will not be repeated here.
  • An embodiment of the present application further provides an access system for an unauthorized packet.
  • the access system for an unauthorized packet may include:
  • the access system for an unauthorized packet shown in the embodiments of the present application can execute the technical solution of the access method for an unauthorized packet shown in any of the foregoing embodiments.
  • the implementation principle and beneficial effects of the method are similar to those of the method embodiments.
  • An embodiment of the present application further provides a computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the network device side in the embodiments corresponding to FIG. 2 to FIG. 5 is executed.
  • Method for accessing unauthorized packets or when a computer program is executed by a processor, execute the method for accessing unauthorized packets on the side of the device to be accessed in the embodiments corresponding to FIG. 2 to FIG. 5, its implementation principle and beneficial effects Similar to the method embodiment, details are not described herein again.
  • An embodiment of the present application further provides a chip, where a computer program is stored on the chip, and a computer program is stored on a computer-readable storage medium.
  • the computer program is executed by a processor, the network in the embodiments corresponding to FIG. 2 to FIG. 4 is executed.
  • Method for accessing unauthorized packets on the device side or, when a computer program is executed by a processor, execute the method for accessing unauthorized packets on the device side to be accessed in the embodiments corresponding to FIG. 2 to FIG. 4, and its implementation principle And the beneficial effects are similar to the method embodiments, and will not be repeated here.
  • the processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), or an off-the-shelf programmable gate array (FPGA). Or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • Software modules can be located in random access memory (RAM), flash memory, read-only memory (ROM), programmable read-only memory or electrically erasable programmable memory, registers, etc.
  • Storage media The storage medium is located in a memory, and the processor reads the instructions in the memory and completes the steps of the foregoing method in combination with its hardware.
  • the disclosed apparatus and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware, or in the form of hardware plus software functional units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Certains modes de réalisation de la présente invention concernent un procédé d'accès sans licence basé sur des groupes, un appareil, et un système, le procédé comportant les étapes consistant à: acquérir des informations de vitesse à utiliser pour chaque appareil parmi M appareils en attente d'accès, M étant un entier supérieur ou égal à 2; déterminer, d'après les informations de vitesse de chaque appareil, un intervalle de vitesse et un ensemble de ressources correspondant à chaque groupe parmi L groupes, L étant un entier supérieur ou égal à 1 et inférieur ou égal à M; envoyer des informations d'accès aux M appareils, les informations d'accès indiquant l'intervalle de vitesse et l'ensemble de ressources correspondant à chaque groupe, de telle façon que les M appareils effectuent des opérations d'accès selon les informations de vitesse et informations d'accès respectives, et obtenir en conséquence une amélioration du rendement d'accès de terminaux tout en assurant également leur sensibilité au service.
PCT/CN2018/100513 2018-08-14 2018-08-14 Procédé d'accès sans licence basé sur des groupes, appareil, et système WO2020034102A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880096487.4A CN112567856B (zh) 2018-08-14 2018-08-14 非授权分组的接入方法、设备及系统
PCT/CN2018/100513 WO2020034102A1 (fr) 2018-08-14 2018-08-14 Procédé d'accès sans licence basé sur des groupes, appareil, et système

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/100513 WO2020034102A1 (fr) 2018-08-14 2018-08-14 Procédé d'accès sans licence basé sur des groupes, appareil, et système

Publications (1)

Publication Number Publication Date
WO2020034102A1 true WO2020034102A1 (fr) 2020-02-20

Family

ID=69524617

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/100513 WO2020034102A1 (fr) 2018-08-14 2018-08-14 Procédé d'accès sans licence basé sur des groupes, appareil, et système

Country Status (2)

Country Link
CN (1) CN112567856B (fr)
WO (1) WO2020034102A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761182A (zh) * 2004-08-17 2006-04-19 三星电子株式会社 在正交频分复用移动通信系统中分配频率的装置和方法
CN102076097A (zh) * 2009-11-25 2011-05-25 华为技术有限公司 资源调度方法及基站
CN104168596A (zh) * 2014-09-03 2014-11-26 重庆邮电大学 用于lte网络中基于移动用户分组设置切换参数的移动优化方法
CN106211348A (zh) * 2015-05-07 2016-12-07 电信科学技术研究院 一种多址接入的方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355736B (zh) * 2011-08-04 2014-04-02 大唐移动通信设备有限公司 一种调用使用的阈值确定和分组调度方法及装置
CN102316594B (zh) * 2011-09-23 2014-06-04 北京邮电大学 认知无线网络中跨层资源分配和分组调度的方法
EP3306849B1 (fr) * 2015-06-08 2023-08-02 LG Electronics Inc. Procédé et appareil pour transmettre et recevoir des données dans un système de communication sans fil
CN105392206B (zh) * 2015-11-27 2018-09-25 京信通信系统(中国)有限公司 一种调度方法及基带单元
US10568081B2 (en) * 2016-03-21 2020-02-18 Samsung Electronics Co., Ltd. Scheduling uplink transmissions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761182A (zh) * 2004-08-17 2006-04-19 三星电子株式会社 在正交频分复用移动通信系统中分配频率的装置和方法
CN102076097A (zh) * 2009-11-25 2011-05-25 华为技术有限公司 资源调度方法及基站
CN104168596A (zh) * 2014-09-03 2014-11-26 重庆邮电大学 用于lte网络中基于移动用户分组设置切换参数的移动优化方法
CN106211348A (zh) * 2015-05-07 2016-12-07 电信科学技术研究院 一种多址接入的方法及装置

Also Published As

Publication number Publication date
CN112567856A (zh) 2021-03-26
CN112567856B (zh) 2022-09-16

Similar Documents

Publication Publication Date Title
US11039448B2 (en) Resource scheduling method and apparatus
TW201834473A (zh) 用於無線站的隨機存取請求管理技術
US11916710B2 (en) Data transmission method and apparatus
EP3107345A1 (fr) Procédé et dispositif d'indication de ressources de canal
EP3451774A1 (fr) Procédé de transmission de données de service, équipement utilisateur et dispositif de réseau
US9622115B2 (en) Channel negotiation method, device, and system
WO2021057564A1 (fr) Procédé et appareil de transmission de priorité d'informations d'état de canal, procédé et appareil de détermination de priorité d'informations d'état de canal, support d'informations, et équipement utilisateur
WO2020200014A1 (fr) Procédé et dispositif de communication
CN103814596A (zh) 传输数据的方法、装置和系统
US11758522B2 (en) Methods and apparatuses for determining a transport block size (TBS) for data transmission
EP3585080A1 (fr) Procédé de traitement de service de multidiffusion, et point d'accès
WO2016172972A1 (fr) Procédé, dispositif et système d'ordonnancement de ressources
WO2017118053A1 (fr) Procédé et appareil de détermination d'occupation de canal
WO2013178177A2 (fr) Procédé et dispositif de signalement de type d'ue et d'attribution de ressources, ue et station de base
WO2022127555A1 (fr) Procédé, système et dispositif de transmission de données sans fil multi-utilisateur, et dispositif de stockage
WO2021155604A1 (fr) Procédé et dispositif de traitement d'informations
WO2018170877A1 (fr) Procédé et appareil d'envoi d'informations, terminal, dispositif de réseau d'accès, et système
WO2020088543A1 (fr) Procédé et appareil d'accès à un réseau
WO2020227869A1 (fr) Procédé de configuration de groupe de ressources, terminal et dispositif de réseau
WO2019095783A1 (fr) Procédé d'association, procédé d'instruction, et dispositif pour bloc de synchronisation et message de signalisation de planification de radiomessagerie
WO2020034102A1 (fr) Procédé d'accès sans licence basé sur des groupes, appareil, et système
WO2016044978A1 (fr) Procédé et appareil d'attribution pour ressource de transmission de dispositif à dispositif
CN113316262B (zh) 上行资源分配方法及装置、计算机可读存储介质、用户设备
WO2021207908A1 (fr) Procédé d'accès aléatoire et dispositif terminal
CN115361098A (zh) 使用分段的无线通信方法和使用其的无线通信终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18929896

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18929896

Country of ref document: EP

Kind code of ref document: A1